Track File Movement from Beginning to End

With support for multiple secure protocols and cryptographic ciphers, both the Express and Advanced Security modules thoroughly protect data in transit. By enforcing the use of secure protocols, strong ciphers, encryption keys, and password policies, data transfers strictly follow all security guidelines.

With either the Express and Advanced Security modules, you can enforce account access policy controls, expire passwords automatically on certain dates, and use AD, NTLM, LDAP, an ODBC-compatible database, or the built-in authentication manager in EFT.

Ongoing Standards Compliance

Securing sensitive company data requires continuous monitoring and validation of security policies and controls. Once enabled, the Express and Advanced Security modules are an ever-vigilant security tool that disallows low-security options, captures compensating controls, and generates reports for auditing the system’s compliance status.

The Express and Advanced Security modules actively monitor PCI DSS by alerting on non-compliance, identifying the cause of non-compliance, allowing reverting of security controls, implementing mitigation/workaround techniques. The Auditing and Reporting module (ARM) captures all of this activity in a fully relational database.

Protection of Data at Rest

Setup wizards provide administrators with an easy, step-by-step method to configuring a new high-security-enabled site, with each page describing the requirement and what you need to do to meet that requirement, or to provide a compensating control (workaround).

The Express and Advanced Security modules, when used with the DMZ Gateway®, help organizations comply with data storage requirements—including not storing data in the network DMZ—using repository encryption and securely sanitizing (wiping) deleted data so that it cannot be reconstituted.

The Advanced Security module (ASM) provides support for easy-to-use authentication methods, including smart card, single sign-on, and multi-factor authentication options. By centralizing authentication methods and using an interoperable solution like ASM with EFT, users can use a single source of authentication across the IT resources they use, including EFT.

The Advanced Security module (ASM) integrates with virus scanners and DLP (Data Loss Prevention) tools to permit or prevent file transfers based on your organization's policies, and supports compliance with PCI DSS. When the CIC Action is added to an Event Rule, any file that triggers the Event Rule is sent to an ICAP server for scanning. With ASM, you won’t expose your network to files containing malware, or share confidential or proprietary information. With the Advanced Security module, you can maintain confidentiality and keeps your network free of files containing malware.

The Advanced Security module works with the following antivirus and DLP servers: